...
CATEGORY A: Criminal Law enforcement/national or public security
Use Case
...
Categorization
Group 1: Criminal Law enforcement/national or public security | Use case: LEA 1, LEA 2, IP 2, IP 3 | |
LEA 1 - Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a non-local data controller. | Use Case - GAC LEA1-13719.docx EPDP Access to Non-Public Data .pdf EPDP Access to Non-Public Data - Overall + Responsibilities.pdf | |
Overarching Purpose: Criminal Law enforcement/national or public security Use case: LEA 2 - Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a local data controller. | Use Case - GAC LEA2 - 7 July 2019.docx | |
Overarching Purpose: Criminal Law enforcement/national or public security - Copyright Use Case: IP 2 - Investigation of criminal activity against a victim in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal trademark) | Use Case - IPC-CopyrightTM-Criminal.docx | |
IP 3 - Investigation of criminal activity in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal copyright) | Use Case - IPC- | TMCopyright-Criminal.docx |
...
Group 2: Non-LE investigations |
---|
...
Overarching Purpose: Digital Crime investigation by non-LEA
Use case: Initial investigation of criminal activity against a victim and/or secondary victim where domain names are used in the commission of the crime (part 1 of 2)
Overarching Purpose: Investigate, detect, prevent, and bring civil claims for Abusive Domain names
Use case: Identify Use Case:and civil claims | BC1/2, BC 3, BC 5, SSAC 3, ALAC 2, IP 1, IP 4 |
---|---|
SSAC 3 - Investigation of criminal activity where domain names are used. Typical specific example: phishing attack. | SSAC Crime-Abuse Investigation Use Case - 11 July 2019.docx |
BC 3 - Identify owner of abusive domains and other related domains involved in civil legal claims related to phishing, malware, botnets, and other fraudulent activities | BC-3 Use Case - Investigate Abusive Domain.docx |
Overarching Purpose: Obtain domain name holder details for legal claims
IP 1 - Trademark owners requesting data in the establishment, exercise or defense of legal claims for trademark infringement | Use Case - trademark infringement use case - updated 28 June 2019.docx Use Case - trademark infringement use case - redline - updated 28 June 2019.docx |
BC1/2 Initial investigation of criminal activity against a victim and/or secondary victim where domain names are used in the commission of the crime | BC-1 & BC-2 Digital Crime Investigation Use Case.docx |
BC 5 - The establishment, exercise or defense of a legal claim involving a registrant of a domain name | BC-5 Use Case - Obtain domain name holder details for legal action.docx |
Overarching Purpose: Site Integrity and Business Integrity Confirmation
Use Case: Search Engines, Messaging Services & Social Media Platforms seeking to confirm the authenticity of businesses advertising or Posting News on its Platform
Overarching Purpose: Enabling timely resolution of domain-based security events and attacks
Use Case:IP 4 - Copyright owners requesting data in the establishment, exercise or defense of legal claims for copyright infringement | Use Case - IPC-Copyright-Civil.docx |
ALAC 2 - Consumer protection organizations | Consumer_Protection_Use_Case_ALAC - Consumer Protection Organizations.docx |
Group 3: Need for redacted data for a third party to contact registrant | BC 7, SSAC 1 |
---|---|
SSAC 1 - When a network is undergoing an attack involving a domain name, and the operator(s) of that network need to contact the domain owner to remediate the security issue (DDOS, Botnet, etc.) | Use Case - SSAC Operational Security.docx |
Overarching Purpose: The processing of personal data to the extent strictly necessary and proportionate for the purposes of ensuring network and information security, i.e. the ability of a network or an information system to resist, at a given level of confidence, accidental events or unlawful or malicious actions that compromise the availability, authenticity, integrity and confidentiality of stored or transmitted personal data, and the security of the related services offered by, or accessible via, those networks and systems, by public authorities, by computer emergency response teams (CERTs), computer security incident response teams (CSIRTs), by providers of electronic communications networks and services and by providers of security technologies and services.
BC 7 - Contacting the Registrant to resolve a Technical or Operational Issue with a Domain Name | BC-7 Use Case - Technical Issue Resolution.docx |
Overarching Purpose: Preventing Fraud - Consumer Protection
Use Case:Group 4: Consumer protection, abuse prevention, digital service provider (DSP) and network security | SSAC 2, BC 9, ALAC 1 |
---|---|
SSAC 2 - Determine “Reputation” of domain name and/or elements associated with domain name registrations. | Use Case - SSAC Reputation Service.docx |
Overarching Purpose: Crime and abuse investigation by non-law enforcement parties
Use Case: Investigation of criminal activity where domain names are used. Typical specific example: phishing attack.
Overarching purpose:
Use case: Trademark owners requesting data in the establishment, exercise or defense of legal claims for trademark infringement
Use Case - trademark infringement use case - updated 28 June 2019.docx
Use Case - trademark infringement use case - redline - updated 28 June 2019.docx
Overarching purpose
Use Case: Copyright owners requesting data in the establishment, exercise or defense of legal claims for copyright infringement
ALAC 1 - Online buyers identifying and validating the source of goods or services/ Internet users validating the legitimacy of an email or a website to protect themselves | Consumer_Protection_Use_Case_ALAC - Online buyers.docx |
Overarching Purpose: Fraud Prevention – Consumer Protection
Use Case: Consumer protection organizations
CATEGORY C: Intellectual Property
BC 9 - Search Engines, Messaging Services & Social Media Platforms seeking to confirm the authenticity of businesses advertising or Posting News on its Platform | BC- 9 Use Case - Site and Business Integrity Confirmation (2).docx |
Group 5: Registered Name Holder consent or contract | BC 4, BC 6, BC 8, IP 5 |
---|---|
IP 5 - Providers requesting access required to facilitate due process in the UDRP and URS |
Overarching Purpose: Business investigation for Domain Portfolio Purchases
Use case: :Use Case - IPC-UDRP-URS-Due-Process.docx |
Category D: Commercial
BC 6 - M&A name portfolio due diligence or purchase of domain name from bankrupt entity or other seller | BC-6 Use Case - M&A and domain purchase.docx |
Overarching Purpose: Issuance of Digital Certificates linked with a Specific Domain
BC 4 - Maintaining the domain name registration by the Registered Name Holder | BC4 Use Case - Domain Name Maintenance.docx |
BC 8 - Help a certification authority determine and validate the identity of the entity associated with a domain name that will be bound to an SSL/TLS certificate | BC-8 Use Case - Certification Authority.docx |
Category E: Domain name maintenance
Overarching Purpose: Resolution of Technical or Operational Issue with a Domain Name
Use Case:LEGEND
LEA 1 | Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a non-local data controller. |
LEA 2 | Investigation of criminal activity against a victim in the jurisdiction of the investigating EU LEA requesting data from a local data controller. |
SSAC 1 | When a network is undergoing an attack involving a domain name, and the operator(s) of that network need to contact the domain owner to remediate the security issue (DDOS, Botnet, etc.) |
SSAC 2 | Determine “Reputation” of domain name and/or elements associated with domain name registrations. |
SSAC 3 | Investigation of criminal activity where domain names are used. Typical specific example: phishing attack. |
IP 1 | Trademark owners requesting data in the establishment, exercise or defense of legal claims for trademark infringement |
IP 2 | Investigation of criminal activity against a victim in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal trademark) |
IP 3 | Investigation of criminal activity in the jurisdiction of the investigating LEA requesting data from either a local a non-local data controller. (criminal copyright) |
IP 4 | Copyright owners requesting data in the establishment, exercise or defense of legal claims for copyright infringement |
IP 5 | Providers requesting access required to facilitate due process in the UDRP and URS |
BC1/2 | Initial investigation of criminal activity against a victim and/or secondary victim where domain names are used in the commission of the crime |
BC 3 | Identify owner of abusive domains and other related domains involved in civil legal claims related to phishing, malware, botnets, and other fraudulent activities |
BC 4 | Maintaining the domain name registration by the Registered Name Holder |
BC 5 | The establishment, exercise or defense of a legal claim involving a registrant of a domain name |
BC 6 | M&A name portfolio due diligence or purchase of domain name from bankrupt entity or other seller |
BC 7 | Contacting the Registrant to resolve a Technical or Operational Issue with a Domain Name |
BC |
Overarching Purpose: Domain name maintenance
Use case: Maintaining the domain name registration by the Registered Name Holder
8 | Help a certification authority determine and validate the identity of the entity associated with a domain name that will be bound to an SSL/TLS certificate |
BC 9 | Search Engines, Messaging Services & Social Media Platforms seeking to confirm the authenticity of businesses advertising or Posting News on its Platform |
ALAC 1 | Online buyers identifying and validating the source of goods or services/ Internet users validating the legitimacy of an email or a website to protect themselves |
ALAC 2 | Consumer protection organizations |